SlideShare a Scribd company logo
1 of 14
Download to read offline
What Kind of Data?
● Vehicle sensors
– Speed, Tire Pressure, Engine Temperature, Oil Pressure,
Door Sensors, ABS State, Trouble Codes, etc.
● Location data (GPS)
● Accelerometer data
– Acceleration and Deceleration
● … And the list is only going to grow
Security vs. Control
● The first is the protection of that data
– Treat the data as “PII”. Robust mechanisms for protecting
data exist and can work – assuming you try!
● The second is how that data can be used
– From an API perspective, there are few tools out there to
help and in many ways this is unexplored territory
Is There a Problem?
● Consumers have (or should have!) an expectation of
ownership and control
● Commercial interests want to monetize (directly or
indirectly) the consumers data
● Mass collection of personal data by Government
entities
Do Consumers Care?
● Usually only after there's a problem
● Over the past few years, data privacy has started to be
discussed in the “mainstream”
● Advocating for consumer control can be a
differentiator for companies
State of the Industry
●
OEMs
– They're coming around
● Aftermarket
– There's a lot of value in that data. We need to resist the urge to
misuse it
● Regulation
– Consumer Car Information and Choice Act (CA SB 994)
– EU has fairly strict data privacy laws but it's unclear whether this
applies to vehicular data
– FTC recently asked Congress to pass laws governing “data
brokers”
What is Control?
● Owners must be able to access (and download) their
data
● Owners must have a way to authorize your API
consumers to their data
● Owners must be able to revoke that access at any
time, and for any reason.
● Owners must be able to delete their data
● Owners must be able to review who has accessed
what data, and when
How do we do this?
● Important to note that we are focusing on
authorization, not authentication
● Resource driven API
– How you structure your API matters!
● OAuth 2.0 is one way
– Let's get it out of the way – OAuth2 is not perfect.
– It's a framework, not a protocol. Not all aspects will fit
your API and you may need additional controls (for
instance, signatures and/or encryption may be needed
beyond SSL/TLS)
Using REST
● … or at least some of it.
– The choice to fully adhere to REST has other factors and
you may decide it's not all for you
● Uniform Interface
– Identification of resources
– Manipulation of resources through these representations
● Beware of Caching!
– Most scalable systems require some level of caching to
improve scalability and performance
– But what if the user revokes access to a cached entity?
Using OAuth2
● Access to a resource is granted based on a validated
access token
– An access token defines authorization between a client (your
API consumer) and a resource controlled by the vehicle owner
● Four mechanisms (grant types) exist for an API
consumer to receive an access token
– Authorization Code
– Implicit
– Resource Owner
– Client Credentials
Authorization Code and Implicit
● These are the primary types used to delegate access to
an API consumer
● When an API consumer needs access to a vehicle
owners data, they request authorization using one of
these two flows. The data owner must log in to your
system and grant access.
● Primary difference between the two is that the
authorization code type is slightly more secure and
therefore supports refresh tokens.
The Other Two
● Resource Owner
– This allows the API consumer to immediately gain access
to a vehicle owners data but it does so by collecting the
owners credentials to your system. Your API consumer
should not have your users core credentials!
● Client Credentials
– This grant type is appropriate for you API consumer to
interact with their data within your system. It is not used
for delegated access.
Technical Challenges
● Access tokens map a client to a single individuals
resources
– This can make API calls that span multiple individuals
problematic
– You'll need to secure your endpoints using a Client
Credential call and then perform the authorization check
internally
● When access tokens are revoked or expired, this can
cause confusion in the user interfaces for your API
consumers
Conclusion
● We need to consider ourselves the gatekeepers of
data, not the owners
● By walking the high ground, you will miss out on
business opportunities! The trust of your users will
make up for it in the long run
● Regulation is important, but there's no reason to wait
for it

More Related Content

Viewers also liked

Hardware requirements
Hardware requirementsHardware requirements
Hardware requirementsDianne Devera
 
Визволення Кіровограду
Визволення Кіровограду Визволення Кіровограду
Визволення Кіровограду DjimmyDiGriz
 
AWS Cloud Disaster Recovery Plan Checklist - Are you ready?
AWS Cloud Disaster Recovery Plan Checklist - Are you ready?AWS Cloud Disaster Recovery Plan Checklist - Are you ready?
AWS Cloud Disaster Recovery Plan Checklist - Are you ready?CloudEndure
 
EКО - ІТ альянс
EКО - ІТ альянсEКО - ІТ альянс
EКО - ІТ альянсDjimmyDiGriz
 
Areca Plates Manufacturing- Prakritii Cultivating Green
Areca Plates Manufacturing- Prakritii Cultivating GreenAreca Plates Manufacturing- Prakritii Cultivating Green
Areca Plates Manufacturing- Prakritii Cultivating GreenPrakritii Cultivating Green
 
місячник шкільної бібліотеки
місячник шкільної бібліотекимісячник шкільної бібліотеки
місячник шкільної бібліотекиDjimmyDiGriz
 
Konferencija z geografiji
Konferencija z geografijiKonferencija z geografiji
Konferencija z geografijiDjimmyDiGriz
 
Q-Point demo upload
Q-Point demo uploadQ-Point demo upload
Q-Point demo uploadharrydahero
 
Благоустрій території школи
Благоустрій території школиБлагоустрій території школи
Благоустрій території школиDjimmyDiGriz
 
Global and china obd telematics industry report, 2014 2015
Global and china obd telematics industry report, 2014 2015Global and china obd telematics industry report, 2014 2015
Global and china obd telematics industry report, 2014 2015ResearchInChina
 
конференція
конференціяконференція
конференціяDjimmyDiGriz
 
Etudes Parcs Naturels Régionaux & Communication en ligne
Etudes Parcs Naturels Régionaux & Communication en ligneEtudes Parcs Naturels Régionaux & Communication en ligne
Etudes Parcs Naturels Régionaux & Communication en ligneGuillaume CROMER
 
DU Devenir Entrepreneur
DU Devenir EntrepreneurDU Devenir Entrepreneur
DU Devenir Entrepreneurdesutit
 
великодні кошики
великодні кошикивеликодні кошики
великодні кошикиDjimmyDiGriz
 
змагання з туризму
змагання з туризмузмагання з туризму
змагання з туризмуDjimmyDiGriz
 
Haitian Art - Destination Haïti en 2030 - Projet touristique durable innovant
Haitian Art - Destination Haïti en 2030 - Projet touristique durable innovantHaitian Art - Destination Haïti en 2030 - Projet touristique durable innovant
Haitian Art - Destination Haïti en 2030 - Projet touristique durable innovantGuillaume CROMER
 

Viewers also liked (16)

Hardware requirements
Hardware requirementsHardware requirements
Hardware requirements
 
Визволення Кіровограду
Визволення Кіровограду Визволення Кіровограду
Визволення Кіровограду
 
AWS Cloud Disaster Recovery Plan Checklist - Are you ready?
AWS Cloud Disaster Recovery Plan Checklist - Are you ready?AWS Cloud Disaster Recovery Plan Checklist - Are you ready?
AWS Cloud Disaster Recovery Plan Checklist - Are you ready?
 
EКО - ІТ альянс
EКО - ІТ альянсEКО - ІТ альянс
EКО - ІТ альянс
 
Areca Plates Manufacturing- Prakritii Cultivating Green
Areca Plates Manufacturing- Prakritii Cultivating GreenAreca Plates Manufacturing- Prakritii Cultivating Green
Areca Plates Manufacturing- Prakritii Cultivating Green
 
місячник шкільної бібліотеки
місячник шкільної бібліотекимісячник шкільної бібліотеки
місячник шкільної бібліотеки
 
Konferencija z geografiji
Konferencija z geografijiKonferencija z geografiji
Konferencija z geografiji
 
Q-Point demo upload
Q-Point demo uploadQ-Point demo upload
Q-Point demo upload
 
Благоустрій території школи
Благоустрій території школиБлагоустрій території школи
Благоустрій території школи
 
Global and china obd telematics industry report, 2014 2015
Global and china obd telematics industry report, 2014 2015Global and china obd telematics industry report, 2014 2015
Global and china obd telematics industry report, 2014 2015
 
конференція
конференціяконференція
конференція
 
Etudes Parcs Naturels Régionaux & Communication en ligne
Etudes Parcs Naturels Régionaux & Communication en ligneEtudes Parcs Naturels Régionaux & Communication en ligne
Etudes Parcs Naturels Régionaux & Communication en ligne
 
DU Devenir Entrepreneur
DU Devenir EntrepreneurDU Devenir Entrepreneur
DU Devenir Entrepreneur
 
великодні кошики
великодні кошикивеликодні кошики
великодні кошики
 
змагання з туризму
змагання з туризмузмагання з туризму
змагання з туризму
 
Haitian Art - Destination Haïti en 2030 - Projet touristique durable innovant
Haitian Art - Destination Haïti en 2030 - Projet touristique durable innovantHaitian Art - Destination Haïti en 2030 - Projet touristique durable innovant
Haitian Art - Destination Haïti en 2030 - Projet touristique durable innovant
 

Similar to Controlling Data on the Connected Highway

Decoding SSO-Partners 6.21.19.pptx
Decoding SSO-Partners 6.21.19.pptxDecoding SSO-Partners 6.21.19.pptx
Decoding SSO-Partners 6.21.19.pptxsonuagain
 
Applying Innovative Tools for GDPR Success
Applying Innovative Tools for GDPR SuccessApplying Innovative Tools for GDPR Success
Applying Innovative Tools for GDPR SuccessForgeRock
 
Agile Gurugram 2023 | Observability for Modern Applications. How does it help...
Agile Gurugram 2023 | Observability for Modern Applications. How does it help...Agile Gurugram 2023 | Observability for Modern Applications. How does it help...
Agile Gurugram 2023 | Observability for Modern Applications. How does it help...AgileNetwork
 
Discover365 Integration Presentation
Discover365 Integration PresentationDiscover365 Integration Presentation
Discover365 Integration PresentationJames Garrett
 
Consumerizing Industrial Access Control: Using UMA to Add Privacy and Usabili...
Consumerizing Industrial Access Control: Using UMA to Add Privacy and Usabili...Consumerizing Industrial Access Control: Using UMA to Add Privacy and Usabili...
Consumerizing Industrial Access Control: Using UMA to Add Privacy and Usabili...ForgeRock
 
Consumerizing Industrial IoT Access Control: Using UMA to Add Privacy and Usa...
Consumerizing Industrial IoT Access Control: Using UMA to Add Privacy and Usa...Consumerizing Industrial IoT Access Control: Using UMA to Add Privacy and Usa...
Consumerizing Industrial IoT Access Control: Using UMA to Add Privacy and Usa...Eve Maler
 
Extending the Power of Consent with User-Managed Access & OpenUMA
Extending the Power of Consent with User-Managed Access & OpenUMAExtending the Power of Consent with User-Managed Access & OpenUMA
Extending the Power of Consent with User-Managed Access & OpenUMAkantarainitiative
 
Virtual Meetup - API Security Best Practices
Virtual Meetup - API Security Best PracticesVirtual Meetup - API Security Best Practices
Virtual Meetup - API Security Best PracticesJimmy Attia
 
Cache Security- Adding Security to Non-Secure Applications
Cache Security- Adding Security to Non-Secure ApplicationsCache Security- Adding Security to Non-Secure Applications
Cache Security- Adding Security to Non-Secure ApplicationsInterSystems Corporation
 
access-control-week-2
access-control-week-2access-control-week-2
access-control-week-2jemtallon
 
WSO2Con EU 2015: API Management Strategies and Best Practices
WSO2Con EU 2015: API Management Strategies and Best PracticesWSO2Con EU 2015: API Management Strategies and Best Practices
WSO2Con EU 2015: API Management Strategies and Best PracticesWSO2
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Adapting to Meet Today’s Trends and Technologies– Compliance vs. Enforcement
Adapting to Meet Today’s Trends and Technologies– Compliance vs. EnforcementAdapting to Meet Today’s Trends and Technologies– Compliance vs. Enforcement
Adapting to Meet Today’s Trends and Technologies– Compliance vs. EnforcementFlexera
 

Similar to Controlling Data on the Connected Highway (20)

OWASP Top 10 Proactive Control 2016 (C5-C10)
OWASP Top 10 Proactive Control 2016 (C5-C10)OWASP Top 10 Proactive Control 2016 (C5-C10)
OWASP Top 10 Proactive Control 2016 (C5-C10)
 
Decoding SSO-Partners 6.21.19.pptx
Decoding SSO-Partners 6.21.19.pptxDecoding SSO-Partners 6.21.19.pptx
Decoding SSO-Partners 6.21.19.pptx
 
Cloud Identity Management
Cloud Identity ManagementCloud Identity Management
Cloud Identity Management
 
Applying Innovative Tools for GDPR Success
Applying Innovative Tools for GDPR SuccessApplying Innovative Tools for GDPR Success
Applying Innovative Tools for GDPR Success
 
Agile Gurugram 2023 | Observability for Modern Applications. How does it help...
Agile Gurugram 2023 | Observability for Modern Applications. How does it help...Agile Gurugram 2023 | Observability for Modern Applications. How does it help...
Agile Gurugram 2023 | Observability for Modern Applications. How does it help...
 
Discover365 Integration Presentation
Discover365 Integration PresentationDiscover365 Integration Presentation
Discover365 Integration Presentation
 
Consumerizing Industrial Access Control: Using UMA to Add Privacy and Usabili...
Consumerizing Industrial Access Control: Using UMA to Add Privacy and Usabili...Consumerizing Industrial Access Control: Using UMA to Add Privacy and Usabili...
Consumerizing Industrial Access Control: Using UMA to Add Privacy and Usabili...
 
Consumerizing Industrial IoT Access Control: Using UMA to Add Privacy and Usa...
Consumerizing Industrial IoT Access Control: Using UMA to Add Privacy and Usa...Consumerizing Industrial IoT Access Control: Using UMA to Add Privacy and Usa...
Consumerizing Industrial IoT Access Control: Using UMA to Add Privacy and Usa...
 
Co p
Co pCo p
Co p
 
Co p
Co pCo p
Co p
 
FirstNet ICAM
FirstNet ICAMFirstNet ICAM
FirstNet ICAM
 
Extending the Power of Consent with User-Managed Access & OpenUMA
Extending the Power of Consent with User-Managed Access & OpenUMAExtending the Power of Consent with User-Managed Access & OpenUMA
Extending the Power of Consent with User-Managed Access & OpenUMA
 
Virtual Meetup - API Security Best Practices
Virtual Meetup - API Security Best PracticesVirtual Meetup - API Security Best Practices
Virtual Meetup - API Security Best Practices
 
Cache Security- Adding Security to Non-Secure Applications
Cache Security- Adding Security to Non-Secure ApplicationsCache Security- Adding Security to Non-Secure Applications
Cache Security- Adding Security to Non-Secure Applications
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
access-control-week-2
access-control-week-2access-control-week-2
access-control-week-2
 
WSO2Con EU 2015: API Management Strategies and Best Practices
WSO2Con EU 2015: API Management Strategies and Best PracticesWSO2Con EU 2015: API Management Strategies and Best Practices
WSO2Con EU 2015: API Management Strategies and Best Practices
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Adapting to Meet Today’s Trends and Technologies– Compliance vs. Enforcement
Adapting to Meet Today’s Trends and Technologies– Compliance vs. EnforcementAdapting to Meet Today’s Trends and Technologies– Compliance vs. Enforcement
Adapting to Meet Today’s Trends and Technologies– Compliance vs. Enforcement
 
OAuth
OAuthOAuth
OAuth
 

Recently uploaded

JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuidePixlogix Infotech
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxMasterG
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityVictorSzoltysek
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...ScyllaDB
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
Navigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi DaparthiNavigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi DaparthiRaviKumarDaparthi
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Skynet Technologies
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch TuesdayIvanti
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireExakis Nelite
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...FIDO Alliance
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe中 央社
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxFIDO Alliance
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...ScyllaDB
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTopCSSGallery
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingScyllaDB
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxjbellis
 

Recently uploaded (20)

JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Navigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi DaparthiNavigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi Daparthi
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 

Controlling Data on the Connected Highway

  • 1.
  • 2. What Kind of Data? ● Vehicle sensors – Speed, Tire Pressure, Engine Temperature, Oil Pressure, Door Sensors, ABS State, Trouble Codes, etc. ● Location data (GPS) ● Accelerometer data – Acceleration and Deceleration ● … And the list is only going to grow
  • 3. Security vs. Control ● The first is the protection of that data – Treat the data as “PII”. Robust mechanisms for protecting data exist and can work – assuming you try! ● The second is how that data can be used – From an API perspective, there are few tools out there to help and in many ways this is unexplored territory
  • 4. Is There a Problem? ● Consumers have (or should have!) an expectation of ownership and control ● Commercial interests want to monetize (directly or indirectly) the consumers data ● Mass collection of personal data by Government entities
  • 5. Do Consumers Care? ● Usually only after there's a problem ● Over the past few years, data privacy has started to be discussed in the “mainstream” ● Advocating for consumer control can be a differentiator for companies
  • 6. State of the Industry ● OEMs – They're coming around ● Aftermarket – There's a lot of value in that data. We need to resist the urge to misuse it ● Regulation – Consumer Car Information and Choice Act (CA SB 994) – EU has fairly strict data privacy laws but it's unclear whether this applies to vehicular data – FTC recently asked Congress to pass laws governing “data brokers”
  • 7. What is Control? ● Owners must be able to access (and download) their data ● Owners must have a way to authorize your API consumers to their data ● Owners must be able to revoke that access at any time, and for any reason. ● Owners must be able to delete their data ● Owners must be able to review who has accessed what data, and when
  • 8. How do we do this? ● Important to note that we are focusing on authorization, not authentication ● Resource driven API – How you structure your API matters! ● OAuth 2.0 is one way – Let's get it out of the way – OAuth2 is not perfect. – It's a framework, not a protocol. Not all aspects will fit your API and you may need additional controls (for instance, signatures and/or encryption may be needed beyond SSL/TLS)
  • 9. Using REST ● … or at least some of it. – The choice to fully adhere to REST has other factors and you may decide it's not all for you ● Uniform Interface – Identification of resources – Manipulation of resources through these representations ● Beware of Caching! – Most scalable systems require some level of caching to improve scalability and performance – But what if the user revokes access to a cached entity?
  • 10. Using OAuth2 ● Access to a resource is granted based on a validated access token – An access token defines authorization between a client (your API consumer) and a resource controlled by the vehicle owner ● Four mechanisms (grant types) exist for an API consumer to receive an access token – Authorization Code – Implicit – Resource Owner – Client Credentials
  • 11. Authorization Code and Implicit ● These are the primary types used to delegate access to an API consumer ● When an API consumer needs access to a vehicle owners data, they request authorization using one of these two flows. The data owner must log in to your system and grant access. ● Primary difference between the two is that the authorization code type is slightly more secure and therefore supports refresh tokens.
  • 12. The Other Two ● Resource Owner – This allows the API consumer to immediately gain access to a vehicle owners data but it does so by collecting the owners credentials to your system. Your API consumer should not have your users core credentials! ● Client Credentials – This grant type is appropriate for you API consumer to interact with their data within your system. It is not used for delegated access.
  • 13. Technical Challenges ● Access tokens map a client to a single individuals resources – This can make API calls that span multiple individuals problematic – You'll need to secure your endpoints using a Client Credential call and then perform the authorization check internally ● When access tokens are revoked or expired, this can cause confusion in the user interfaces for your API consumers
  • 14. Conclusion ● We need to consider ourselves the gatekeepers of data, not the owners ● By walking the high ground, you will miss out on business opportunities! The trust of your users will make up for it in the long run ● Regulation is important, but there's no reason to wait for it